H:\iNodeCode\br_patch_PC_V7R3B05D131\inodemgr\Build\ReleasePdb\Setup.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a72e01947877ca735b94fe6ae0cedf8a12cedaea1be761dbc4819bf4949384e3.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a72e01947877ca735b94fe6ae0cedf8a12cedaea1be761dbc4819bf4949384e3.exe
Resource
win10v2004-20240802-en
General
-
Target
a72e01947877ca735b94fe6ae0cedf8a12cedaea1be761dbc4819bf4949384e3
-
Size
10.1MB
-
MD5
6fe08be71a12cdad21a85eb23fcd3832
-
SHA1
a8992b77221b66e06b99a40ceeeefabc3af99c68
-
SHA256
a72e01947877ca735b94fe6ae0cedf8a12cedaea1be761dbc4819bf4949384e3
-
SHA512
8deffe875c1340d54f1cd4c1a4333911ab2f18206baace52e4ff978ef3447ac312614a8003a75f11e1d56379f0ebe66eb1ff6ea162924dd71eef6deaf81b49bc
-
SSDEEP
196608:u9iHfdAiSkhVB8H9OxvsByWG2xxcKIgJlKIpJU2DtUGteFpXR7tQtClL:8i/dD5V6dOCyWG2NIgJ5pJdDtUGUrXRT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a72e01947877ca735b94fe6ae0cedf8a12cedaea1be761dbc4819bf4949384e3
Files
-
a72e01947877ca735b94fe6ae0cedf8a12cedaea1be761dbc4819bf4949384e3.exe windows:5 windows x86 arch:x86
ebab04c36d90f6ea25abc47408c06902
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
dbghelp
MakeSureDirectoryPathExists
kernel32
GetPrivateProfileStringA
WritePrivateProfileStringA
CreateDirectoryA
GetCurrentThreadId
WriteFile
SetFilePointer
GetLastError
CreateFileA
GetLocalTime
Sleep
FindClose
FindNextFileA
FindFirstFileA
DeleteFileA
GetSystemDefaultLangID
CopyFileA
GetModuleFileNameA
CreateEventA
GetDiskFreeSpaceA
GetSystemDirectoryA
GetSystemInfo
ReadFile
GetEnvironmentVariableA
WaitForSingleObject
MultiByteToWideChar
GetPrivateProfileSectionNamesA
MoveFileExA
SetFileAttributesA
GetFileAttributesA
RemoveDirectoryA
GetTickCount
GetPrivateProfileIntA
CreateProcessA
GetStartupInfoA
CreatePipe
DeviceIoControl
GetVersionExA
GetComputerNameA
WideCharToMultiByte
LoadLibraryW
InterlockedExchange
FreeLibrary
SetConsoleCtrlHandler
HeapReAlloc
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetStringTypeW
FlushFileBuffers
SetStdHandle
GetConsoleMode
GetConsoleCP
HeapSize
FatalAppExitA
LCMapStringW
GetLocaleInfoW
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameW
HeapDestroy
GetCurrentProcess
GetModuleHandleA
GetProcAddress
InitializeCriticalSection
OpenProcess
GetCurrentProcessId
CreateToolhelp32Snapshot
Process32First
Process32Next
CloseHandle
WriteConsoleW
SetEndOfFile
GetProcessHeap
CreateFileW
InterlockedCompareExchange
GetFileAttributesExA
HeapCreate
ExitProcess
RaiseException
RtlUnwind
GetSystemTimeAsFileTime
ExitThread
CreateThread
HeapFree
GetCommandLineA
HeapSetInformation
GetStartupInfoW
DecodePointer
EncodePointer
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
IsProcessorFeaturePresent
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetModuleHandleW
SetLastError
InterlockedDecrement
GetCurrentThread
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
user32
ExitWindowsEx
CreateDialogParamA
GetDesktopWindow
GetWindowRect
SetWindowPos
UpdateWindow
GetMessageA
IsDialogMessageA
TranslateMessage
DispatchMessageA
DestroyWindow
EndDialog
SetDlgItemTextA
SetWindowTextA
GetDlgItem
ShowWindow
SendMessageA
SetFocus
GetWindowTextLengthA
GetWindowTextA
MessageBoxA
PostQuitMessage
advapi32
RegSetValueExA
GetUserNameA
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
GetTokenInformation
AllocateAndInitializeSid
EqualSid
FreeSid
RegCreateKeyA
RegDeleteValueA
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
ShellExecuteA
Sections
.text Size: 422KB - Virtual size: 421KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 816KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ